[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[DONE] wml://security/2010/dsa-2{004,112,116}.wml



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- --- english/security/2010/dsa-2004.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2004.wml	2016-07-28 17:52:39.710391762 +0500
@@ -1,31 +1,32 @@
- -<define-tag description>several vulnerabilities</define-tag>
+#use wml::debian::translation-check translation="1.3" maintainer="Lev Lamberov"
+<define-tag description>неÑ?колÑ?ко Ñ?Ñ?звимоÑ?Ñ?ей</define-tag>
 <define-tag moreinfo>
- -<p>Two local vulnerabilities have been discovered in samba, a SMB/CIFS file,
- -print, and login server for Unix. The Common  Vulnerabilities and 
- -Exposures project identifies the following problems:</p>
+<p>Ð?ве локалÑ?нÑ?е Ñ?Ñ?звимоÑ?Ñ?и бÑ?ли обнаÑ?Ñ?женÑ? в samba, Ñ?айловом Ñ?еÑ?веÑ?е, Ñ?еÑ?веÑ?е
+пеÑ?аÑ?и и вÑ?ода SMB/CIFS длÑ? Unix. Ð?Ñ?оекÑ? Common  Vulnerabilities and
+Exposures опÑ?еделÑ?еÑ? Ñ?ледÑ?Ñ?Ñ?ие пÑ?облемÑ?:</p>
 
 <ul>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2009-3297";>CVE-2009-3297</a>
 
- -    <p>Ronald Volgers discovered that a race condition in mount.cifs
- -    allows local users to mount remote filesystems over arbitrary
- -    mount points.</p></li>
+    <p>РоналÑ?д Ð?олджеÑ?Ñ? обнаÑ?Ñ?жил, Ñ?Ñ?о Ñ?оÑ?Ñ?оÑ?ние гонки в mount.cifs
+    позволÑ?еÑ? локалÑ?нÑ?м полÑ?зоваÑ?елÑ?м монÑ?иÑ?оваÑ?Ñ? Ñ?далÑ?ннÑ?е Ñ?айловÑ?е Ñ?иÑ?Ñ?емÑ? Ñ?еÑ?ез пÑ?оизволÑ?нÑ?е
+    Ñ?оÑ?ки монÑ?иÑ?ованиÑ?.</p></li>
 
 <li><a href="https://security-tracker.debian.org/tracker/CVE-2010-0547";>CVE-2010-0547</a>
 
- -    <p>Jeff Layton discovered that missing input sanitising in mount.cifs
- -    allows denial of service by corrupting /etc/mtab.</p></li>
+    <p>Ð?жеÑ? Ð?Ñ?йÑ?он обнаÑ?Ñ?жил, Ñ?Ñ?о оÑ?Ñ?Ñ?Ñ?Ñ?Ñ?вие оÑ?иÑ?Ñ?ки вÑ?однÑ?Ñ? даннÑ?Ñ? в mount.cifs
+    позволÑ?еÑ? вÑ?зÑ?ваÑ?Ñ? оÑ?каз в обÑ?лÑ?живании пÑ?Ñ?Ñ?м повÑ?еждениÑ? /etc/mtab.</p></li>
 
 </ul>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 2:3.2.5-4lenny9.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2:3.2.5-4lenny9.</p>
 
- -<p>For the unstable distribution (sid), these problems have been fixed in
- -version 2:3.4.5~dfsg-2.</p>
+<p>Ð? неÑ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (sid) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2:3.4.5~dfsg-2.</p>
 
- -<p>We recommend that you upgrade your samba packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? samba.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2112.wml	2014-04-30 13:16:22.000000000 +0600
+++ russian/security/2010/dsa-2112.wml	2016-07-28 17:57:05.288515304 +0500
@@ -1,26 +1,27 @@
- -<define-tag description>integer overflow</define-tag>
+#use wml::debian::translation-check translation="1.4" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел</define-tag>
 <define-tag moreinfo>
- -<p>Mikolaj Izdebski has discovered an integer overflow flaw in the 
- -BZ2_decompress function in bzip2/libbz2. An attacker could use a 
- -crafted bz2 file to cause a denial of service (application crash)
- -or potentially to execute arbitrary code. (<a href="https://security-tracker.debian.org/tracker/CVE-2010-0405";>CVE-2010-0405</a>)</p>
+<p>Ð?иколай Ð?здебÑ?кий обнаÑ?Ñ?жил пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел в
+Ñ?Ñ?нкÑ?ии BZ2_decompress в bzip2/libbz2. Ð?лоÑ?мÑ?Ñ?ленник можеÑ? иÑ?полÑ?зоваÑ?Ñ?
+Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й Ñ?айл bz2 длÑ? вÑ?зова оÑ?каза в обÑ?лÑ?живании (аваÑ?ийнаÑ? оÑ?Ñ?ановка пÑ?иложениÑ?)
+или поÑ?енÑ?иалÑ?ного вÑ?полнениÑ? пÑ?оизволÑ?ного кода. (<a href="https://security-tracker.debian.org/tracker/CVE-2010-0405";>CVE-2010-0405</a>)</p>
 
- -<p>After the upgrade, all running services that use libbz2 need to be
- -restarted.</p>
+<p>Ð?оÑ?ле обновлениÑ? Ñ?ледÑ?еÑ? пеÑ?езапÑ?Ñ?Ñ?иÑ?Ñ? вÑ?е Ñ?абоÑ?аÑ?Ñ?ие Ñ?лÑ?жбÑ?,
+иÑ?полÑ?зÑ?Ñ?Ñ?ие libbz2.</p>
 
- -<p>This update also provides rebuilt dpkg packages, which are statically
- -linked to the fixed version of libbz2. Updated packages for clamav,
- -which is also affected by this issue, will be provided on debian-volatile.</p>
+<p>Ð?анное обновление пÑ?едоÑ?Ñ?авлÑ?еÑ? заново Ñ?обÑ?аннÑ?е пакеÑ?Ñ? dpkg, коÑ?оÑ?Ñ?е Ñ?Ñ?аÑ?иÑ?еÑ?ки
+Ñ?компонованÑ? Ñ? иÑ?пÑ?авленной веÑ?Ñ?ией libbz2. Ð?бновлÑ?ннÑ?е пакеÑ?Ñ? длÑ? анÑ?ивиÑ?Ñ?Ñ?а clamav,
+коÑ?оÑ?Ñ?й Ñ?оже подвеÑ?жен данной пÑ?облеме, бÑ?дÑ?Ñ? пÑ?едоÑ?Ñ?авленÑ? в Ñ?азделе debian-volatile.</p>
 
- -<p>For the stable distribution (lenny), this problem has been fixed in
- -version 1.0.5-1+lenny1.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?а пÑ?облема бÑ?ла иÑ?пÑ?авлена в
+веÑ?Ñ?ии 1.0.5-1+lenny1.</p>
 
- -<p>For the testing distribution (squeeze) and the unstable distribution (sid),
- -this problem in bzip2 will be fixed soon. Updated dpkg packages are not
- -necessary for testing/unstable.</p>
+<p>Ð? Ñ?еÑ?Ñ?иÑ?Ñ?емом (squeeze) и неÑ?Ñ?абилÑ?ном (sid) вÑ?пÑ?Ñ?каÑ? Ñ?Ñ?а
+пÑ?облема в пакеÑ?е bzip2 бÑ?деÑ? иÑ?пÑ?авлена позже. Ð?бновлÑ?ннÑ?е пакеÑ?Ñ? dpkg
+длÑ? Ñ?еÑ?Ñ?иÑ?Ñ?емого/неÑ?Ñ?абилÑ?ного вÑ?пÑ?Ñ?ков не Ñ?Ñ?ебÑ?Ñ?Ñ?Ñ?Ñ?.</p>
 
 
- -<p>We recommend that you upgrade your bzip2 / dpkg packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? bzip2 / dpkg.</p>
 </define-tag>
 
 # do not modify the following line
- --- english/security/2010/dsa-2116.wml	2010-10-05 23:28:27.000000000 +0600
+++ russian/security/2010/dsa-2116.wml	2016-07-28 18:02:14.301660382 +0500
@@ -1,25 +1,26 @@
- -<define-tag description>integer overflow</define-tag>
+#use wml::debian::translation-check translation="1.1" maintainer="Lev Lamberov"
+<define-tag description>пеÑ?еполнение Ñ?елÑ?Ñ? Ñ?иÑ?ел</define-tag>
 <define-tag moreinfo>
- -<p>Marc Schoenefeld has found an input stream position error in the
- -way the FreeType font rendering engine processed input file streams.
- -If a user loaded a specially-crafted font file with an application
- -linked against FreeType and relevant font glyphs were subsequently
- -rendered with the X FreeType library (libXft), it could cause the
- -application to crash or, possibly execute arbitrary code.</p>
+<p>Ð?аÑ?к ШÑ?неÑ?елÑ?д обнаÑ?Ñ?жил оÑ?ибкÑ? позиÑ?ии вÑ?одного поÑ?ока даннÑ?Ñ? в
+Ñ?поÑ?обе, иÑ?полÑ?зÑ?емом движком оÑ?Ñ?иÑ?овки Ñ?Ñ?иÑ?Ñ?ов FreeType длÑ? обÑ?абоÑ?ки вÑ?однÑ?Ñ? Ñ?айловÑ?Ñ? поÑ?оков.
+Ð?Ñ?ли полÑ?зоваÑ?елÑ? загÑ?Ñ?зиÑ? Ñ?пеÑ?иалÑ?но Ñ?Ñ?оÑ?миÑ?ованнÑ?й Ñ?айл Ñ?Ñ?иÑ?Ñ?ов в пÑ?иложение,
+Ñ?компонованное Ñ? FreeType, а Ñ?ооÑ?веÑ?Ñ?Ñ?вÑ?Ñ?Ñ?ие глиÑ?Ñ? Ñ?Ñ?иÑ?Ñ?ов бÑ?дÑ?Ñ? заÑ?ем
+оÑ?Ñ?иÑ?ованÑ? Ñ? помоÑ?Ñ?Ñ? библиоÑ?еки X FreeType (libXft), Ñ?о Ñ?Ñ?о вÑ?зовеÑ?
+аваÑ?ийнÑ?Ñ? оÑ?Ñ?ановкÑ? пÑ?иложениÑ? или возможное вÑ?полнение пÑ?оизволÑ?ного кода.</p>
 
- -<p>After the upgrade, all running applications and services that use
- -libfreetype6 should be restarted. In most cases, logging out and
- -in again should be enough. The script checkrestart from the
- -debian-goodies package or lsof may help to find out which
- -processes are still using the old version of libfreetype6.</p>
+<p>Ð?оÑ?ле обновлениÑ? Ñ?ледÑ?еÑ? пеÑ?езапÑ?Ñ?Ñ?иÑ?Ñ? вÑ?е Ñ?абоÑ?аÑ?Ñ?ие пÑ?иложениÑ? и
+Ñ?лÑ?жбÑ?, иÑ?полÑ?зÑ?Ñ?Ñ?ие libfreetype6. Ð? болÑ?Ñ?инÑ?Ñ?ве Ñ?лÑ?Ñ?аев бÑ?деÑ? доÑ?Ñ?аÑ?оÑ?но
+вÑ?йÑ?и из Ñ?иÑ?Ñ?емÑ? и заново войÑ?и в неÑ?. СÑ?енаÑ?ий checkrestart из пакеÑ?а
+debian-goodies или Ñ?Ñ?илиÑ?а lsof могÑ?Ñ? помоÑ?Ñ? вам вÑ?Ñ?виÑ?Ñ? пÑ?оÑ?еÑ?Ñ?Ñ?,
+иÑ?полÑ?зÑ?Ñ?Ñ?ие Ñ?Ñ?аÑ?Ñ?Ñ? веÑ?Ñ?иÑ? libfreetype6.</p>
 
- -<p>For the stable distribution (lenny), these problems have been fixed in
- -version 2.3.7-2+lenny4.</p>
+<p>Ð? Ñ?Ñ?абилÑ?ном вÑ?пÑ?Ñ?ке (lenny) Ñ?Ñ?и пÑ?облемÑ? бÑ?ли иÑ?пÑ?авленÑ? в
+веÑ?Ñ?ии 2.3.7-2+lenny4.</p>
 
- -<p>The testing distribution (squeeze) and the unstable distribution (sid)
- -are not affected by this problem.</p>
+<p>ТеÑ?Ñ?иÑ?Ñ?емÑ?й (squeeze) и неÑ?Ñ?абилÑ?нÑ?й (sid) вÑ?пÑ?Ñ?ки
+не подвеÑ?женÑ? Ñ?казанной пÑ?облеме.</p>
 
- -<p>We recommend that you upgrade your freetype packages.</p>
+<p>РекомендÑ?еÑ?Ñ?Ñ? обновиÑ?Ñ? пакеÑ?Ñ? freetype.</p>
 </define-tag>
 
 # do not modify the following line
-----BEGIN PGP SIGNATURE-----
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=kdGv
-----END PGP SIGNATURE-----


Reply to: